Abstract:
The present disclosure provides systems and methods for storing, reading, and writing data using particle-based acoustic wave driven shift registers. The shift registers may physically shift particles along rows and/or columns of wells through the interactions of two parallel surfaces. A transducer may generate an acoustic wave to displace one or more of the two parallel surfaces. The particles may be transferred to and/or otherwise constrained by a buffer surface during at least a portion of the acoustic wave, such that the particles may be shifted during one or more cycles of the acoustic wave. In various embodiments, the amplitude of the acoustic wave may correspond to the spacing distance between each of the wells. The wells may be physical and/or potential wells.
Abstract:
A method substantially as shown and described in the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described in the detailed description and/or drawings and/or elsewhere herein.
Abstract:
Structures and protocols are presented for configuring an unmanned aerial device to perform a task, alone or in combination with other entities, or for using data resulting from such a configuration or performance.
Abstract:
A computationally implemented system and method that is designed to, but is not limited to: obtain information at least in part regarding one or more first aspects of one or more intermediate electronic communication devices for serving as one or more nodes of one or more standby point-to-point communication networks upon activation thereof for use by an origination electronic communication device to communicate at least in part with a destination electronic communication device, the one or more intermediate electronic communication devices having one or more second aspects as one or more mobile electronic communication devices. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
Abstract:
Computationally implemented methods and systems include receiving one or more signals through a directional antenna of a wearable computing device, the one or more signals having been transmitted by one or more electronic devices; determining that the one or more electronic devices are within a spatial pod surrounding the wearable computing device based, at least in part, on the one or more signals received by the wearable computing device; and obtaining at least access to one or more functionalities from the one or more electronic devices that were determined to be within the spatial pod of the wearable computing device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include detecting presence of a plurality of functional devices within the communication range of a wearable computing device; and selecting, from the plurality of functional devices, one or more functional devices for providing to the wearable computing device one or more functionalities. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include facilitating a head wearable computing device to receive one or more solicitations via one or more solicitation signals that solicit to provide to a limb wearable computing device gesture indicative data that is indicative of one or more user gestures, the head wearable computing device being designed to be worn on a head of a user and the limb wearable computing device being designed to be worn around a limb of a user; and directing the head wearable computing device to transmit to the limb wearable computing device the gesture indicative data via one or more low-power gesture indicative data signals, the limb wearable computing device being within communication range of the head wearable computing device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-two encrypted data and at least one associated hash; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash.
Abstract:
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein.
Abstract:
Computationally implemented methods and systems that are designed for transmitting a request for one or more identities of a transportation vehicle unit for transporting a first end user; receiving the one or more identities of the transportation vehicle unit for transporting the first end user, the transportation vehicle unit currently en route to or is currently transporting a second end user and having been identified based, at least in part, on a determination that the transportation vehicle unit is able to accommodate transport of the first end user while transporting the second end user; and directing the identified transportation vehicle unit to rendezvous with the first end user in order to transport the first end user. In addition to the foregoing, other aspects are described in the claims, drawings, and text.